Small Unit Tactics contact patriot-dawn Patriot Rising

Likely Information Sources: "Post-Event"

Home Forums Information & Intelligence Likely Information Sources: "Post-Event"

This topic contains 10 replies, has 4 voices, and was last updated by Profile photo of Aerohawk Aerohawk 2 years, 6 months ago.

Viewing 11 posts - 1 through 11 (of 11 total)
  • Author
    Posts
  • #30098
    Profile photo of Joe (G.W.N.S.)
    Joe (G.W.N.S.)
    Moderator

    Information is the life blood of an Analyst, no information means no Intelligence. Remember information does not equal intelligence.

    This will be a multi-part series on likely sources, from the easy to the more advanced.

    First up, the Shortwave radio w/SSB.

    Shortwave radio monitoring will provide you with worldwide availability of information.

    SSB is a must have item to provide amateur radio monitoring.

    You need to have a listing of updated frequencies and broadcast times of all English speaking (if multilingual include those also) broadcasts.

    Operation, storage, and protection of this equipment can be found in the Radio & Communication sub-forum.

    Radio Scanner will provide monitoring of local transmissions. The information this can provide is critical to your survival. Having several in order to dedicate some for specific tasks should be considered (used older equipment maybe of use for this purpose). A Scanner can be used for basic DFing of signal sources with the right combination of operator and equipment. Depending on geography of your AO it can also provide early warning of people in your area. For example: In my relatively flat Florida, if I intercept FRS radio transmissions this indicates the presence of people no more than 1 1/2 miles away (probably less). Note: Knowledge of of various detection ranges based on various settings can be determined in advance.

    Remember even though you can’t listen in on encrypted communications, its presence is an indicator in itself.

    Various Software Defined Radios can provide a wealth of information at a reasonable price point. Wx satellite images? Digital radio scanner? Yes to all.

    #30107
    Profile photo of CommsPrepper
    CommsPrepper
    Participant

    Great points!

    #30115
    Profile photo of Joe (G.W.N.S.)
    Joe (G.W.N.S.)
    Moderator

    Remember the above related Radio sources are not all inclusive, we are truly only limited by our imagination.

    For example consider a “Event” such as described in Max’s Patriot Dawn/Rising. An SDR set up could be used for passive early warning of everything from drones, aircraft, to various ground vehicles. Basically an off the shelf ESM (Electronic Support Measures). This would require developing a database of emissions related to various sources. This provides a practical application of Intelligence support.

    More to come…

    #30127
    Profile photo of Robert
    Robert
    Participant

    Excellent, thanks!

    www.jrhenterprises.com
    RMP, TC3, NODF, CRCD 6/14, CP 9/14. NODF, Land Nav, 6/15. Rifleman Challenge 9/15- Vanguard. FOFtactics 3/16, 10/16, 11/16, 6/17,11/17 CTT, 6/15, 11/16, , LRMC-1 9/17 GA Mobile CTT and DA 10/16, GA mobile DCH 3/18, HEAT1 3/18 Alum weekend 8/18, Opfor CLC 10/18, DA 11/18 CQBC 12/18

    #30129
    Profile photo of Joe (G.W.N.S.)
    Joe (G.W.N.S.)
    Moderator

    We have covered the basic radio information sources.

    Next we have information you collect, remember every action is a source of information.

    You observe a group of refugees moving near your location, you see smoke in the distance, increased or lack of aircraft operating, neighbor reports theft of eggs, these are all information that needs to be taking note of and used to develop intelligence.

    Patrols you conduct (please review chapter Ten “Patrols” in Contact).

    Every trip away from your Retreat/Base needs to be debriefed for information.

    Every contact regardless of how mundane needs to be debriefed and a report generated.

    Your neighbor down the road walks by with a cart (this is noted) and returns later with firewood in cart (this again is noted). Why? Example: You find this neighbor’s door open and no sign of life, upon a search you find him dead with throat slit and no sign of his family. Since you have record of the last time you saw him and the condition of his remains. You can determine a rough guestimate of when this happened. This could have value in determining your next action.

    Remember every action/interaction is a source of information!

    More to come…

    #30132
    Profile photo of Joe (G.W.N.S.)
    Joe (G.W.N.S.)
    Moderator
    #30138
    Profile photo of Joe (G.W.N.S.)
    Joe (G.W.N.S.)
    Moderator

    Remember information to develop intelligence isn’t only for threat analysis.

    Consider the neighbor example:

    Your neighbor down the road walks by with a cart (this is noted) and returns later with firewood in cart (this again is noted).

    Obviously firewood has value to him.

    A earlier report has him spending most of his time developing a substantial crop for harvest. His firewood has been observed to be inadequate for the coming winter.

    You have more firewood than is needed, even given a harsh winter. You could use some additional fresh produce for canning since having taken in more people. Obviously a barter arrangement is possible given your information.

    Sources of material or knowledge is an important part of “Post-Event” Intelligence.

    #30236
    Profile photo of Joe (G.W.N.S.)
    Joe (G.W.N.S.)
    Moderator

    Let’s touch on the idea of Human intelligence (HUMINT).

    This will be on a very basic level and we will get into this in far more detail at a later date.

    I foresee that for the vast majority what we are really talking about is not truly handling assets, but closer to the civilian term networking and it can be useful in many practical ways right now. Developing these kinds of relationships with contacts now can make future use far easier, even if done by a cutout at that time.

    So in this context we need to develop “Network Lists,” consider using “contact list software.” There are many suitable for this purpose that accept photos, biographies, known associates, family members etc… of course back it up digitally and hard copy. Some of this software even provides interconnection graphic charting of associations with others.

    Who should be on this network list? Well almost anyone! (please don’t assign some uber military/super secret squirrel name to this, if for some reason you are arrested/investigated the last thing you need is some Targeted, OPFOR, Informant, etc…list in your possession).

    You never know who could be the key person in the future.

    Some priorities could include, LEO’s, Active/Reserve Military, Politicians, Public Employees, Bureaucrats of any flavor, Bartenders, Barbers, Hairstylists, nail salon workers, Doctors, Airport employees, Emergency Management, well you get the idea. I put in bold some that can provide incredibly valuable information.

    Almost everyone knows of at least one person that seems to know almost everything about their neighbors. Consider how this maybe of use.

    A network of these individuals could make for some unique collection sources who could seamlessly blend in your community.

    More to come…

    #30243
    Profile photo of Joe (G.W.N.S.)
    Joe (G.W.N.S.)
    Moderator

    An unfortunate, but realistic part of playing the part of Handler or even just meeting new people for both networking and potential team members is evaluating their trustworthiness and reliability.

    Like much Intelligence work this will be a basic introduction as books could and have been written. A more detailed study of sources and reliability will be conducted latter.

    This is about focusing on your protection!

    This is an introduction in the use of “Control Information” for detection of compromises against you.

    For these purposes “Control Information” is information released to a specific individual.

    This information does not have to be true, but needs to be plausible. Detailed notes maybe necessary depending on how frequent and numerous your use of these methods. The security of this record is paramount in order to prevent the information being used to compromise legitimate sources.

    The basic idea is that you share this “Control Information” with only one person with the agreement of them keeping it between the two of you. The “Control Information” is embedded with other legitimately exchanged information casually shared to prevent focus on it.

    Should this “Control Information” surface you now have the specific source identified, assuming notes; if any, haven’t been compromised.

    What you do with this information will depend on situation.

    Options could range from simply breaking all ties to this individual to using it as a base for planned disinformation.

    What you shouldn’t do is reveal the the specifics of how you determined this to prevent countermeasures if you are specifically being targeted.

    This is a valuable option that is easily used. It could save your life.

    More to come…

    #30246
    Profile photo of Joe (G.W.N.S.)
    Joe (G.W.N.S.)
    Moderator

    Well we have covered the most likely basic information sources.

    Radios, reconnaissance, and people.

    Here I’ll mention a few more advanced options that are not outside the realm of possibility.

    Private aircraft, everything from ultralights, light experimental, and regular aircraft.

    Even in many of the most extreme “Events” it’s not like all the aircraft and pilots will just vanish. So aerial reconnaissance and various other electronic missions are not outside of reality depending on scenario.

    Drones, there are many possibilities and are truly only limited by your imagination, technical resources, and budget. Remember we’re not just thinking aerial, but surface ground and water.

    Consider this previous Thread “Regular Guy” Drone Use in Security and Patrol Operations, just remember the prices and capabilities have change dramatically since it’s 2014 posting.

    This site DIY Drones has much information.

    That should just about cover “likely” sources.

    #30250
    Profile photo of Aerohawk
    Aerohawk
    Participant

    Well we have covered the most likely basic information sources.

    Radios, reconnaissance, and people.

    Here I’ll mention a few more advanced options that are not outside the realm of possibility.

    Private aircraft, everything from ultralights, light experimental, and regular aircraft.

    Even in many of the most extreme “Events” it’s not like all the aircraft and pilots will just vanish. So aerial reconnaissance and various other electronic missions are not outside of reality depending on scenario.

    Drones, there are many possibilities and are truly only limited by your imagination, technical resources, and budget. Remember we’re not just thinking aerial, but surface ground and water.

    Consider this previous Thread “Regular Guy” Drone Use in Security and Patrol Operations, just remember the prices and capabilities have change dramatically since it’s 2014 posting.

    This site DIY Drones has much information.

    That should just about cover “likely” sources.

    Ultra lights and powered parachutes would be best due to there ability to use pump gas and there ability to be taken apart and hidden when not in use.

    2017 Texas R/S CTT
    2017 Texas FoF/ CQB

Viewing 11 posts - 1 through 11 (of 11 total)

You must be logged in to reply to this topic.